Skip to content

Add ability to configure auth backends and classes #1397

Add ability to configure auth backends and classes

Add ability to configure auth backends and classes #1397

Re-run triggered June 25, 2024 08:15
Status Failure
Total duration 20m 4s
Artifacts

ci.yml

on: pull_request
Puppet  /  Static validations
24s
Puppet / Static validations
Matrix: Puppet / acceptance
Matrix: Puppet / unit
Puppet  /  Test suite
0s
Puppet / Test suite
Fit to window
Zoom out
Zoom in

Annotations

28 errors
Puppet / Puppet 7 - CentOS 8 - Pulp nightly
Process completed with exit code 1.
Puppet / Puppet 8 - CentOS 8 - Pulp nightly
Process completed with exit code 1.
Puppet / Puppet 8 - CentOS 8 - Pulp 3.39
Process completed with exit code 1.
Puppet / Puppet 7 - CentOS 8 - Pulp 3.39
Process completed with exit code 1.
Puppet / Puppet 8 - AlmaLinux 9 - Pulp 3.39: spec/acceptance/settings_spec.rb#L102
AUTHENTICATION_BACKENDS setting default AUTHENTICATION_BACKENDS File "/etc/pulp/settings.py" content is expected to match /^AUTHENTICATION_BACKENDS = \['pulpcore.app.authentication.PulpNoCreateRemoteUserBackend'\]$/ Failure/Error: its(:content) { is_expected.to match(/^AUTHENTICATION_BACKENDS = \['pulpcore.app.authentication.PulpNoCreateRemoteUserBackend'\]$/) } expected "################################################################################\n# File managed by ...nsole'],\n 'level': 'WARNING',\n 'propagate': False,\n },\n },\n}\n" to match /^AUTHENTICATION_BACKENDS = \['pulpcore.app.authentication.PulpNoCreateRemoteUserBackend'\]$/ Diff: @@ -1,75 +1,149 @@ -/^AUTHENTICATION_BACKENDS = \['pulpcore.app.authentication.PulpNoCreateRemoteUserBackend'\]$/ +################################################################################ +# File managed by Puppet module: pulpcore +################################################################################ +# Not only will edits be overwritten later, there is also a strong +# possibility of breaking the system if changes are made here without making +# required corresponding changes elsewhere. Refer to the documentation used to +# install Pulpcore to determine the safe and persistent way to modify the +# configuration. +################################################################################ + +# Send anonymous usage data to https://analytics.pulpproject.org/ unless this is +# explicitly defined with value False. This data is used by the Pulp project +# to make informed, data-driven decisions about future feature development. +# ANALYTICS = False + +CONTENT_ORIGIN = "https://almalinux9-64-puppet8.example.com" +SECRET_KEY = "CKRZupZ2TiqdS6JiChWMbCLHpifgTUSqMfdTeARNP7xoQ9XkQU" +DATABASES = { + 'default': { + 'ENGINE': 'django.db.backends.postgresql', + 'NAME': 'pulpcore', + 'USER': 'pulp', + 'PASSWORD': 'aRSV7fqsGyHoP9hY9phaD9R8MC5eJEKw', + 'HOST': 'localhost', + 'PORT': '5432', + }, +} +REDIS_URL = "redis://localhost:6379/8" + + +MEDIA_ROOT = "/var/lib/pulp/media" +STATIC_ROOT = "/var/lib/pulp/assets" +STATIC_URL = "/assets/" +FILE_UPLOAD_TEMP_DIR = "/var/lib/pulp/tmp" +WORKING_DIRECTORY = "/var/lib/pulp/tmp" + +REMOTE_USER_ENVIRON_NAME = 'HTTP_REMOTE_USER' +AUTHENTICATION_BACKENDS = ["pulpcore.app.authentication.PulpNoCreateRemoteUserBackend"] + +REST_FRAMEWORK__DEFAULT_AUTHENTICATION_CLASSES = ( + 'rest_framework.authentication.SessionAuthentication', + 'pulpcore.app.authentication.PulpRemoteUserAuthentication', +) + +ALLOWED_IMPORT_PATHS = ["/var/lib/pulp/sync_imports"] +ALLOWED_EXPORT_PATHS = [] +ALLOWED_CONTENT_CHECKSUMS = ["sha224", "sha256", "sha384", "sha512"] + +# Derive HTTP/HTTPS via the X-Forwarded-Proto header set by Apache +SECURE_PROXY_SSL_HEADER = ('HTTP_X_FORWARDED_PROTO', 'https') + +CACHE_ENABLED = False + +# HIDE_GUARDED_DISTRIBUTIONS = False + +# IMPORT_WORKERS_PERCENT = 100 +LOGGING = { + "dynaconf_merge": True, + "loggers": { + '': { + 'handlers': ['console'], + 'level': 'INFO', + }, + 'pulpcore.deprecation': { + 'handlers': ['console'], + 'level': 'ERROR', + 'propagate': False, + }, + 'django_guid': { + 'handlers': ['console'], + 'level': 'WARNING', + 'propagate': False, + }, + }, +}
Puppet / Puppet 8 - AlmaLinux 9 - Pulp 3.39
Process completed with exit code 1.
Puppet / Puppet 7 - AlmaLinux 9 - Pulp 3.39: spec/acceptance/settings_spec.rb#L102
AUTHENTICATION_BACKENDS setting default AUTHENTICATION_BACKENDS File "/etc/pulp/settings.py" content is expected to match /^AUTHENTICATION_BACKENDS = \['pulpcore.app.authentication.PulpNoCreateRemoteUserBackend'\]$/ Failure/Error: its(:content) { is_expected.to match(/^AUTHENTICATION_BACKENDS = \['pulpcore.app.authentication.PulpNoCreateRemoteUserBackend'\]$/) } expected "################################################################################\n# File managed by ...nsole'],\n 'level': 'WARNING',\n 'propagate': False,\n },\n },\n}\n" to match /^AUTHENTICATION_BACKENDS = \['pulpcore.app.authentication.PulpNoCreateRemoteUserBackend'\]$/ Diff: @@ -1,75 +1,149 @@ -/^AUTHENTICATION_BACKENDS = \['pulpcore.app.authentication.PulpNoCreateRemoteUserBackend'\]$/ +################################################################################ +# File managed by Puppet module: pulpcore +################################################################################ +# Not only will edits be overwritten later, there is also a strong +# possibility of breaking the system if changes are made here without making +# required corresponding changes elsewhere. Refer to the documentation used to +# install Pulpcore to determine the safe and persistent way to modify the +# configuration. +################################################################################ + +# Send anonymous usage data to https://analytics.pulpproject.org/ unless this is +# explicitly defined with value False. This data is used by the Pulp project +# to make informed, data-driven decisions about future feature development. +# ANALYTICS = False + +CONTENT_ORIGIN = "https://almalinux9-64-puppet7.example.com" +SECRET_KEY = "qBjzvchVrNP8zc6ahrfkVt3jTBxwLrTNfhi6AoxjnpEWSVmNGe" +DATABASES = { + 'default': { + 'ENGINE': 'django.db.backends.postgresql', + 'NAME': 'pulpcore', + 'USER': 'pulp', + 'PASSWORD': '8wFEQVhC7BjwX3oMNychmg2gZGNGPyKW', + 'HOST': 'localhost', + 'PORT': '5432', + }, +} +REDIS_URL = "redis://localhost:6379/8" + + +MEDIA_ROOT = "/var/lib/pulp/media" +STATIC_ROOT = "/var/lib/pulp/assets" +STATIC_URL = "/assets/" +FILE_UPLOAD_TEMP_DIR = "/var/lib/pulp/tmp" +WORKING_DIRECTORY = "/var/lib/pulp/tmp" + +REMOTE_USER_ENVIRON_NAME = 'HTTP_REMOTE_USER' +AUTHENTICATION_BACKENDS = ["pulpcore.app.authentication.PulpNoCreateRemoteUserBackend"] + +REST_FRAMEWORK__DEFAULT_AUTHENTICATION_CLASSES = ( + 'rest_framework.authentication.SessionAuthentication', + 'pulpcore.app.authentication.PulpRemoteUserAuthentication', +) + +ALLOWED_IMPORT_PATHS = ["/var/lib/pulp/sync_imports"] +ALLOWED_EXPORT_PATHS = [] +ALLOWED_CONTENT_CHECKSUMS = ["sha224", "sha256", "sha384", "sha512"] + +# Derive HTTP/HTTPS via the X-Forwarded-Proto header set by Apache +SECURE_PROXY_SSL_HEADER = ('HTTP_X_FORWARDED_PROTO', 'https') + +CACHE_ENABLED = False + +# HIDE_GUARDED_DISTRIBUTIONS = False + +# IMPORT_WORKERS_PERCENT = 100 +LOGGING = { + "dynaconf_merge": True, + "loggers": { + '': { + 'handlers': ['console'], + 'level': 'INFO', + }, + 'pulpcore.deprecation': { + 'handlers': ['console'], + 'level': 'ERROR', + 'propagate': False, + }, + 'django_guid': { + 'handlers': ['console'], + 'level': 'WARNING', + 'propagate': False, + }, + }, +}
Puppet / Puppet 7 - AlmaLinux 9 - Pulp 3.39
Process completed with exit code 1.
Puppet / Puppet 7 - AlmaLinux 8 - Pulp 3.39: spec/acceptance/settings_spec.rb#L102
AUTHENTICATION_BACKENDS setting default AUTHENTICATION_BACKENDS File "/etc/pulp/settings.py" content is expected to match /^AUTHENTICATION_BACKENDS = \['pulpcore.app.authentication.PulpNoCreateRemoteUserBackend'\]$/ Failure/Error: its(:content) { is_expected.to match(/^AUTHENTICATION_BACKENDS = \['pulpcore.app.authentication.PulpNoCreateRemoteUserBackend'\]$/) } expected "################################################################################\n# File managed by ...nsole'],\n 'level': 'WARNING',\n 'propagate': False,\n },\n },\n}\n" to match /^AUTHENTICATION_BACKENDS = \['pulpcore.app.authentication.PulpNoCreateRemoteUserBackend'\]$/ Diff: @@ -1,75 +1,149 @@ -/^AUTHENTICATION_BACKENDS = \['pulpcore.app.authentication.PulpNoCreateRemoteUserBackend'\]$/ +################################################################################ +# File managed by Puppet module: pulpcore +################################################################################ +# Not only will edits be overwritten later, there is also a strong +# possibility of breaking the system if changes are made here without making +# required corresponding changes elsewhere. Refer to the documentation used to +# install Pulpcore to determine the safe and persistent way to modify the +# configuration. +################################################################################ + +# Send anonymous usage data to https://analytics.pulpproject.org/ unless this is +# explicitly defined with value False. This data is used by the Pulp project +# to make informed, data-driven decisions about future feature development. +# ANALYTICS = False + +CONTENT_ORIGIN = "https://almalinux8-64-puppet7.example.com" +SECRET_KEY = "NmCTeVD6u6NKF4pZUy4hncDtbxJroGGkJXKNZfUpYYPLLhhEJw" +DATABASES = { + 'default': { + 'ENGINE': 'django.db.backends.postgresql', + 'NAME': 'pulpcore', + 'USER': 'pulp', + 'PASSWORD': '3QJiemGsrtwYjoU5xkVXYZu6pWcUX8wi', + 'HOST': 'localhost', + 'PORT': '5432', + }, +} +REDIS_URL = "redis://localhost:6379/8" + + +MEDIA_ROOT = "/var/lib/pulp/media" +STATIC_ROOT = "/var/lib/pulp/assets" +STATIC_URL = "/assets/" +FILE_UPLOAD_TEMP_DIR = "/var/lib/pulp/tmp" +WORKING_DIRECTORY = "/var/lib/pulp/tmp" + +REMOTE_USER_ENVIRON_NAME = 'HTTP_REMOTE_USER' +AUTHENTICATION_BACKENDS = ["pulpcore.app.authentication.PulpNoCreateRemoteUserBackend"] + +REST_FRAMEWORK__DEFAULT_AUTHENTICATION_CLASSES = ( + 'rest_framework.authentication.SessionAuthentication', + 'pulpcore.app.authentication.PulpRemoteUserAuthentication', +) + +ALLOWED_IMPORT_PATHS = ["/var/lib/pulp/sync_imports"] +ALLOWED_EXPORT_PATHS = [] +ALLOWED_CONTENT_CHECKSUMS = ["sha224", "sha256", "sha384", "sha512"] + +# Derive HTTP/HTTPS via the X-Forwarded-Proto header set by Apache +SECURE_PROXY_SSL_HEADER = ('HTTP_X_FORWARDED_PROTO', 'https') + +CACHE_ENABLED = False + +# HIDE_GUARDED_DISTRIBUTIONS = False + +# IMPORT_WORKERS_PERCENT = 100 +LOGGING = { + "dynaconf_merge": True, + "loggers": { + '': { + 'handlers': ['console'], + 'level': 'INFO', + }, + 'pulpcore.deprecation': { + 'handlers': ['console'], + 'level': 'ERROR', + 'propagate': False, + }, + 'django_guid': { + 'handlers': ['console'], + 'level': 'WARNING', + 'propagate': False, + }, + }, +}
Puppet / Puppet 7 - AlmaLinux 8 - Pulp 3.39
Process completed with exit code 1.
Puppet / Puppet 8 - AlmaLinux 8 - Pulp 3.39: spec/acceptance/settings_spec.rb#L102
AUTHENTICATION_BACKENDS setting default AUTHENTICATION_BACKENDS File "/etc/pulp/settings.py" content is expected to match /^AUTHENTICATION_BACKENDS = \['pulpcore.app.authentication.PulpNoCreateRemoteUserBackend'\]$/ Failure/Error: its(:content) { is_expected.to match(/^AUTHENTICATION_BACKENDS = \['pulpcore.app.authentication.PulpNoCreateRemoteUserBackend'\]$/) } expected "################################################################################\n# File managed by ...nsole'],\n 'level': 'WARNING',\n 'propagate': False,\n },\n },\n}\n" to match /^AUTHENTICATION_BACKENDS = \['pulpcore.app.authentication.PulpNoCreateRemoteUserBackend'\]$/ Diff: @@ -1,75 +1,149 @@ -/^AUTHENTICATION_BACKENDS = \['pulpcore.app.authentication.PulpNoCreateRemoteUserBackend'\]$/ +################################################################################ +# File managed by Puppet module: pulpcore +################################################################################ +# Not only will edits be overwritten later, there is also a strong +# possibility of breaking the system if changes are made here without making +# required corresponding changes elsewhere. Refer to the documentation used to +# install Pulpcore to determine the safe and persistent way to modify the +# configuration. +################################################################################ + +# Send anonymous usage data to https://analytics.pulpproject.org/ unless this is +# explicitly defined with value False. This data is used by the Pulp project +# to make informed, data-driven decisions about future feature development. +# ANALYTICS = False + +CONTENT_ORIGIN = "https://almalinux8-64-puppet8.example.com" +SECRET_KEY = "FT3sFh27KjoPn7P2YUyGiudk852Cbz6c6Z4McCWHoRhuj4bvHa" +DATABASES = { + 'default': { + 'ENGINE': 'django.db.backends.postgresql', + 'NAME': 'pulpcore', + 'USER': 'pulp', + 'PASSWORD': 'vL9ZkHMTQgHYXr9p3HKNRKqM64fjTGy3', + 'HOST': 'localhost', + 'PORT': '5432', + }, +} +REDIS_URL = "redis://localhost:6379/8" + + +MEDIA_ROOT = "/var/lib/pulp/media" +STATIC_ROOT = "/var/lib/pulp/assets" +STATIC_URL = "/assets/" +FILE_UPLOAD_TEMP_DIR = "/var/lib/pulp/tmp" +WORKING_DIRECTORY = "/var/lib/pulp/tmp" + +REMOTE_USER_ENVIRON_NAME = 'HTTP_REMOTE_USER' +AUTHENTICATION_BACKENDS = ["pulpcore.app.authentication.PulpNoCreateRemoteUserBackend"] + +REST_FRAMEWORK__DEFAULT_AUTHENTICATION_CLASSES = ( + 'rest_framework.authentication.SessionAuthentication', + 'pulpcore.app.authentication.PulpRemoteUserAuthentication', +) + +ALLOWED_IMPORT_PATHS = ["/var/lib/pulp/sync_imports"] +ALLOWED_EXPORT_PATHS = [] +ALLOWED_CONTENT_CHECKSUMS = ["sha224", "sha256", "sha384", "sha512"] + +# Derive HTTP/HTTPS via the X-Forwarded-Proto header set by Apache +SECURE_PROXY_SSL_HEADER = ('HTTP_X_FORWARDED_PROTO', 'https') + +CACHE_ENABLED = False + +# HIDE_GUARDED_DISTRIBUTIONS = False + +# IMPORT_WORKERS_PERCENT = 100 +LOGGING = { + "dynaconf_merge": True, + "loggers": { + '': { + 'handlers': ['console'], + 'level': 'INFO', + }, + 'pulpcore.deprecation': { + 'handlers': ['console'], + 'level': 'ERROR', + 'propagate': False, + }, + 'django_guid': { + 'handlers': ['console'], + 'level': 'WARNING', + 'propagate': False, + }, + }, +}
Puppet / Puppet 8 - AlmaLinux 8 - Pulp 3.39
Process completed with exit code 1.
Puppet / Puppet 8 - CentOS 9 - Pulp 3.39: spec/acceptance/settings_spec.rb#L102
AUTHENTICATION_BACKENDS setting default AUTHENTICATION_BACKENDS File "/etc/pulp/settings.py" content is expected to match /^AUTHENTICATION_BACKENDS = \['pulpcore.app.authentication.PulpNoCreateRemoteUserBackend'\]$/ Failure/Error: its(:content) { is_expected.to match(/^AUTHENTICATION_BACKENDS = \['pulpcore.app.authentication.PulpNoCreateRemoteUserBackend'\]$/) } expected "################################################################################\n# File managed by ...nsole'],\n 'level': 'WARNING',\n 'propagate': False,\n },\n },\n}\n" to match /^AUTHENTICATION_BACKENDS = \['pulpcore.app.authentication.PulpNoCreateRemoteUserBackend'\]$/ Diff: @@ -1,75 +1,149 @@ -/^AUTHENTICATION_BACKENDS = \['pulpcore.app.authentication.PulpNoCreateRemoteUserBackend'\]$/ +################################################################################ +# File managed by Puppet module: pulpcore +################################################################################ +# Not only will edits be overwritten later, there is also a strong +# possibility of breaking the system if changes are made here without making +# required corresponding changes elsewhere. Refer to the documentation used to +# install Pulpcore to determine the safe and persistent way to modify the +# configuration. +################################################################################ + +# Send anonymous usage data to https://analytics.pulpproject.org/ unless this is +# explicitly defined with value False. This data is used by the Pulp project +# to make informed, data-driven decisions about future feature development. +# ANALYTICS = False + +CONTENT_ORIGIN = "https://centos9-64-puppet8.example.com" +SECRET_KEY = "a4BZgDuBRz9i5L8K2ouTidxCTHPaNq9aBsq73TLdpLkSJJWhLT" +DATABASES = { + 'default': { + 'ENGINE': 'django.db.backends.postgresql', + 'NAME': 'pulpcore', + 'USER': 'pulp', + 'PASSWORD': 'ug4p6m86smNoQXrincvgkuYariZExDiP', + 'HOST': 'localhost', + 'PORT': '5432', + }, +} +REDIS_URL = "redis://localhost:6379/8" + + +MEDIA_ROOT = "/var/lib/pulp/media" +STATIC_ROOT = "/var/lib/pulp/assets" +STATIC_URL = "/assets/" +FILE_UPLOAD_TEMP_DIR = "/var/lib/pulp/tmp" +WORKING_DIRECTORY = "/var/lib/pulp/tmp" + +REMOTE_USER_ENVIRON_NAME = 'HTTP_REMOTE_USER' +AUTHENTICATION_BACKENDS = ["pulpcore.app.authentication.PulpNoCreateRemoteUserBackend"] + +REST_FRAMEWORK__DEFAULT_AUTHENTICATION_CLASSES = ( + 'rest_framework.authentication.SessionAuthentication', + 'pulpcore.app.authentication.PulpRemoteUserAuthentication', +) + +ALLOWED_IMPORT_PATHS = ["/var/lib/pulp/sync_imports"] +ALLOWED_EXPORT_PATHS = [] +ALLOWED_CONTENT_CHECKSUMS = ["sha224", "sha256", "sha384", "sha512"] + +# Derive HTTP/HTTPS via the X-Forwarded-Proto header set by Apache +SECURE_PROXY_SSL_HEADER = ('HTTP_X_FORWARDED_PROTO', 'https') + +CACHE_ENABLED = False + +# HIDE_GUARDED_DISTRIBUTIONS = False + +# IMPORT_WORKERS_PERCENT = 100 +LOGGING = { + "dynaconf_merge": True, + "loggers": { + '': { + 'handlers': ['console'], + 'level': 'INFO', + }, + 'pulpcore.deprecation': { + 'handlers': ['console'], + 'level': 'ERROR', + 'propagate': False, + }, + 'django_guid': { + 'handlers': ['console'], + 'level': 'WARNING', + 'propagate': False, + }, + }, +}
Puppet / Puppet 8 - CentOS 9 - Pulp 3.39
Process completed with exit code 1.
Puppet / Puppet 7 - CentOS 9 - Pulp 3.39: spec/acceptance/settings_spec.rb#L102
AUTHENTICATION_BACKENDS setting default AUTHENTICATION_BACKENDS File "/etc/pulp/settings.py" content is expected to match /^AUTHENTICATION_BACKENDS = \['pulpcore.app.authentication.PulpNoCreateRemoteUserBackend'\]$/ Failure/Error: its(:content) { is_expected.to match(/^AUTHENTICATION_BACKENDS = \['pulpcore.app.authentication.PulpNoCreateRemoteUserBackend'\]$/) } expected "################################################################################\n# File managed by ...nsole'],\n 'level': 'WARNING',\n 'propagate': False,\n },\n },\n}\n" to match /^AUTHENTICATION_BACKENDS = \['pulpcore.app.authentication.PulpNoCreateRemoteUserBackend'\]$/ Diff: @@ -1,75 +1,149 @@ -/^AUTHENTICATION_BACKENDS = \['pulpcore.app.authentication.PulpNoCreateRemoteUserBackend'\]$/ +################################################################################ +# File managed by Puppet module: pulpcore +################################################################################ +# Not only will edits be overwritten later, there is also a strong +# possibility of breaking the system if changes are made here without making +# required corresponding changes elsewhere. Refer to the documentation used to +# install Pulpcore to determine the safe and persistent way to modify the +# configuration. +################################################################################ + +# Send anonymous usage data to https://analytics.pulpproject.org/ unless this is +# explicitly defined with value False. This data is used by the Pulp project +# to make informed, data-driven decisions about future feature development. +# ANALYTICS = False + +CONTENT_ORIGIN = "https://centos9-64-puppet7.example.com" +SECRET_KEY = "SbwcbsdtWHKKw4ZTHe9J842ZknXi7pCYB4kCHuCbKJpJwTm3Ab" +DATABASES = { + 'default': { + 'ENGINE': 'django.db.backends.postgresql', + 'NAME': 'pulpcore', + 'USER': 'pulp', + 'PASSWORD': 'aKe9nhUQSqM857R82ZXbkZ2YuMZJ3yJD', + 'HOST': 'localhost', + 'PORT': '5432', + }, +} +REDIS_URL = "redis://localhost:6379/8" + + +MEDIA_ROOT = "/var/lib/pulp/media" +STATIC_ROOT = "/var/lib/pulp/assets" +STATIC_URL = "/assets/" +FILE_UPLOAD_TEMP_DIR = "/var/lib/pulp/tmp" +WORKING_DIRECTORY = "/var/lib/pulp/tmp" + +REMOTE_USER_ENVIRON_NAME = 'HTTP_REMOTE_USER' +AUTHENTICATION_BACKENDS = ["pulpcore.app.authentication.PulpNoCreateRemoteUserBackend"] + +REST_FRAMEWORK__DEFAULT_AUTHENTICATION_CLASSES = ( + 'rest_framework.authentication.SessionAuthentication', + 'pulpcore.app.authentication.PulpRemoteUserAuthentication', +) + +ALLOWED_IMPORT_PATHS = ["/var/lib/pulp/sync_imports"] +ALLOWED_EXPORT_PATHS = [] +ALLOWED_CONTENT_CHECKSUMS = ["sha224", "sha256", "sha384", "sha512"] + +# Derive HTTP/HTTPS via the X-Forwarded-Proto header set by Apache +SECURE_PROXY_SSL_HEADER = ('HTTP_X_FORWARDED_PROTO', 'https') + +CACHE_ENABLED = False + +# HIDE_GUARDED_DISTRIBUTIONS = False + +# IMPORT_WORKERS_PERCENT = 100 +LOGGING = { + "dynaconf_merge": True, + "loggers": { + '': { + 'handlers': ['console'], + 'level': 'INFO', + }, + 'pulpcore.deprecation': { + 'handlers': ['console'], + 'level': 'ERROR', + 'propagate': False, + }, + 'django_guid': { + 'handlers': ['console'], + 'level': 'WARNING', + 'propagate': False, + }, + }, +}
Puppet / Puppet 7 - CentOS 9 - Pulp 3.39
Process completed with exit code 1.
Puppet / Puppet 7 - AlmaLinux 9 - Pulp nightly: spec/acceptance/settings_spec.rb#L102
AUTHENTICATION_BACKENDS setting default AUTHENTICATION_BACKENDS File "/etc/pulp/settings.py" content is expected to match /^AUTHENTICATION_BACKENDS = \['pulpcore.app.authentication.PulpNoCreateRemoteUserBackend'\]$/ Failure/Error: its(:content) { is_expected.to match(/^AUTHENTICATION_BACKENDS = \['pulpcore.app.authentication.PulpNoCreateRemoteUserBackend'\]$/) } expected "################################################################################\n# File managed by ...nsole'],\n 'level': 'WARNING',\n 'propagate': False,\n },\n },\n}\n" to match /^AUTHENTICATION_BACKENDS = \['pulpcore.app.authentication.PulpNoCreateRemoteUserBackend'\]$/ Diff: @@ -1,75 +1,149 @@ -/^AUTHENTICATION_BACKENDS = \['pulpcore.app.authentication.PulpNoCreateRemoteUserBackend'\]$/ +################################################################################ +# File managed by Puppet module: pulpcore +################################################################################ +# Not only will edits be overwritten later, there is also a strong +# possibility of breaking the system if changes are made here without making +# required corresponding changes elsewhere. Refer to the documentation used to +# install Pulpcore to determine the safe and persistent way to modify the +# configuration. +################################################################################ + +# Send anonymous usage data to https://analytics.pulpproject.org/ unless this is +# explicitly defined with value False. This data is used by the Pulp project +# to make informed, data-driven decisions about future feature development. +# ANALYTICS = False + +CONTENT_ORIGIN = "https://almalinux9-64-puppet7.example.com" +SECRET_KEY = "Zc4XPRxFtfPUFopsZxXL4BhekX7JdEMLseYUL4kDuRhhqduivk" +DATABASES = { + 'default': { + 'ENGINE': 'django.db.backends.postgresql', + 'NAME': 'pulpcore', + 'USER': 'pulp', + 'PASSWORD': 'px9UYBriUyvt2MM7vNdUJbUWFzjSWWCe', + 'HOST': 'localhost', + 'PORT': '5432', + }, +} +REDIS_URL = "redis://localhost:6379/8" + + +MEDIA_ROOT = "/var/lib/pulp/media" +STATIC_ROOT = "/var/lib/pulp/assets" +STATIC_URL = "/assets/" +FILE_UPLOAD_TEMP_DIR = "/var/lib/pulp/tmp" +WORKING_DIRECTORY = "/var/lib/pulp/tmp" + +REMOTE_USER_ENVIRON_NAME = 'HTTP_REMOTE_USER' +AUTHENTICATION_BACKENDS = ["pulpcore.app.authentication.PulpNoCreateRemoteUserBackend"] + +REST_FRAMEWORK__DEFAULT_AUTHENTICATION_CLASSES = ( + 'rest_framework.authentication.SessionAuthentication', + 'pulpcore.app.authentication.PulpRemoteUserAuthentication', +) + +ALLOWED_IMPORT_PATHS = ["/var/lib/pulp/sync_imports"] +ALLOWED_EXPORT_PATHS = [] +ALLOWED_CONTENT_CHECKSUMS = ["sha224", "sha256", "sha384", "sha512"] + +# Derive HTTP/HTTPS via the X-Forwarded-Proto header set by Apache +SECURE_PROXY_SSL_HEADER = ('HTTP_X_FORWARDED_PROTO', 'https') + +CACHE_ENABLED = False + +# HIDE_GUARDED_DISTRIBUTIONS = False + +# IMPORT_WORKERS_PERCENT = 100 +LOGGING = { + "dynaconf_merge": True, + "loggers": { + '': { + 'handlers': ['console'], + 'level': 'INFO', + }, + 'pulpcore.deprecation': { + 'handlers': ['console'], + 'level': 'ERROR', + 'propagate': False, + }, + 'django_guid': { + 'handlers': ['console'], + 'level': 'WARNING', + 'propagate': False, + }, + }, +}
Puppet / Puppet 7 - AlmaLinux 9 - Pulp nightly
Process completed with exit code 1.
Puppet / Puppet 7 - CentOS 9 - Pulp nightly: spec/acceptance/settings_spec.rb#L102
AUTHENTICATION_BACKENDS setting default AUTHENTICATION_BACKENDS File "/etc/pulp/settings.py" content is expected to match /^AUTHENTICATION_BACKENDS = \['pulpcore.app.authentication.PulpNoCreateRemoteUserBackend'\]$/ Failure/Error: its(:content) { is_expected.to match(/^AUTHENTICATION_BACKENDS = \['pulpcore.app.authentication.PulpNoCreateRemoteUserBackend'\]$/) } expected "################################################################################\n# File managed by ...nsole'],\n 'level': 'WARNING',\n 'propagate': False,\n },\n },\n}\n" to match /^AUTHENTICATION_BACKENDS = \['pulpcore.app.authentication.PulpNoCreateRemoteUserBackend'\]$/ Diff: @@ -1,75 +1,149 @@ -/^AUTHENTICATION_BACKENDS = \['pulpcore.app.authentication.PulpNoCreateRemoteUserBackend'\]$/ +################################################################################ +# File managed by Puppet module: pulpcore +################################################################################ +# Not only will edits be overwritten later, there is also a strong +# possibility of breaking the system if changes are made here without making +# required corresponding changes elsewhere. Refer to the documentation used to +# install Pulpcore to determine the safe and persistent way to modify the +# configuration. +################################################################################ + +# Send anonymous usage data to https://analytics.pulpproject.org/ unless this is +# explicitly defined with value False. This data is used by the Pulp project +# to make informed, data-driven decisions about future feature development. +# ANALYTICS = False + +CONTENT_ORIGIN = "https://centos9-64-puppet7.example.com" +SECRET_KEY = "AnRqj4pgEbwhn6xya4AanZCeHQfz94EYyY9yqTDQFePAqC98Rk" +DATABASES = { + 'default': { + 'ENGINE': 'django.db.backends.postgresql', + 'NAME': 'pulpcore', + 'USER': 'pulp', + 'PASSWORD': 'j9YPMkMbbAmmf8s7kb4PmASZkourxjr7', + 'HOST': 'localhost', + 'PORT': '5432', + }, +} +REDIS_URL = "redis://localhost:6379/8" + + +MEDIA_ROOT = "/var/lib/pulp/media" +STATIC_ROOT = "/var/lib/pulp/assets" +STATIC_URL = "/assets/" +FILE_UPLOAD_TEMP_DIR = "/var/lib/pulp/tmp" +WORKING_DIRECTORY = "/var/lib/pulp/tmp" + +REMOTE_USER_ENVIRON_NAME = 'HTTP_REMOTE_USER' +AUTHENTICATION_BACKENDS = ["pulpcore.app.authentication.PulpNoCreateRemoteUserBackend"] + +REST_FRAMEWORK__DEFAULT_AUTHENTICATION_CLASSES = ( + 'rest_framework.authentication.SessionAuthentication', + 'pulpcore.app.authentication.PulpRemoteUserAuthentication', +) + +ALLOWED_IMPORT_PATHS = ["/var/lib/pulp/sync_imports"] +ALLOWED_EXPORT_PATHS = [] +ALLOWED_CONTENT_CHECKSUMS = ["sha224", "sha256", "sha384", "sha512"] + +# Derive HTTP/HTTPS via the X-Forwarded-Proto header set by Apache +SECURE_PROXY_SSL_HEADER = ('HTTP_X_FORWARDED_PROTO', 'https') + +CACHE_ENABLED = False + +# HIDE_GUARDED_DISTRIBUTIONS = False + +# IMPORT_WORKERS_PERCENT = 100 +LOGGING = { + "dynaconf_merge": True, + "loggers": { + '': { + 'handlers': ['console'], + 'level': 'INFO', + }, + 'pulpcore.deprecation': { + 'handlers': ['console'], + 'level': 'ERROR', + 'propagate': False, + }, + 'django_guid': { + 'handlers': ['console'], + 'level': 'WARNING', + 'propagate': False, + }, + }, +}
Puppet / Puppet 7 - CentOS 9 - Pulp nightly
Process completed with exit code 1.
Puppet / Puppet 8 - AlmaLinux 8 - Pulp nightly: spec/acceptance/settings_spec.rb#L102
AUTHENTICATION_BACKENDS setting default AUTHENTICATION_BACKENDS File "/etc/pulp/settings.py" content is expected to match /^AUTHENTICATION_BACKENDS = \['pulpcore.app.authentication.PulpNoCreateRemoteUserBackend'\]$/ Failure/Error: its(:content) { is_expected.to match(/^AUTHENTICATION_BACKENDS = \['pulpcore.app.authentication.PulpNoCreateRemoteUserBackend'\]$/) } expected "################################################################################\n# File managed by ...nsole'],\n 'level': 'WARNING',\n 'propagate': False,\n },\n },\n}\n" to match /^AUTHENTICATION_BACKENDS = \['pulpcore.app.authentication.PulpNoCreateRemoteUserBackend'\]$/ Diff: @@ -1,75 +1,149 @@ -/^AUTHENTICATION_BACKENDS = \['pulpcore.app.authentication.PulpNoCreateRemoteUserBackend'\]$/ +################################################################################ +# File managed by Puppet module: pulpcore +################################################################################ +# Not only will edits be overwritten later, there is also a strong +# possibility of breaking the system if changes are made here without making +# required corresponding changes elsewhere. Refer to the documentation used to +# install Pulpcore to determine the safe and persistent way to modify the +# configuration. +################################################################################ + +# Send anonymous usage data to https://analytics.pulpproject.org/ unless this is +# explicitly defined with value False. This data is used by the Pulp project +# to make informed, data-driven decisions about future feature development. +# ANALYTICS = False + +CONTENT_ORIGIN = "https://almalinux8-64-puppet8.example.com" +SECRET_KEY = "RCbS3C9qPzLeXkkCCFDUqGWsVw7YD47KMzoNCjx8Q4a8v36xNf" +DATABASES = { + 'default': { + 'ENGINE': 'django.db.backends.postgresql', + 'NAME': 'pulpcore', + 'USER': 'pulp', + 'PASSWORD': 'boo9abDJ3LQzG7mD27faFSLVaHK8Pfp5', + 'HOST': 'localhost', + 'PORT': '5432', + }, +} +REDIS_URL = "redis://localhost:6379/8" + + +MEDIA_ROOT = "/var/lib/pulp/media" +STATIC_ROOT = "/var/lib/pulp/assets" +STATIC_URL = "/assets/" +FILE_UPLOAD_TEMP_DIR = "/var/lib/pulp/tmp" +WORKING_DIRECTORY = "/var/lib/pulp/tmp" + +REMOTE_USER_ENVIRON_NAME = 'HTTP_REMOTE_USER' +AUTHENTICATION_BACKENDS = ["pulpcore.app.authentication.PulpNoCreateRemoteUserBackend"] + +REST_FRAMEWORK__DEFAULT_AUTHENTICATION_CLASSES = ( + 'rest_framework.authentication.SessionAuthentication', + 'pulpcore.app.authentication.PulpRemoteUserAuthentication', +) + +ALLOWED_IMPORT_PATHS = ["/var/lib/pulp/sync_imports"] +ALLOWED_EXPORT_PATHS = [] +ALLOWED_CONTENT_CHECKSUMS = ["sha224", "sha256", "sha384", "sha512"] + +# Derive HTTP/HTTPS via the X-Forwarded-Proto header set by Apache +SECURE_PROXY_SSL_HEADER = ('HTTP_X_FORWARDED_PROTO', 'https') + +CACHE_ENABLED = False + +# HIDE_GUARDED_DISTRIBUTIONS = False + +# IMPORT_WORKERS_PERCENT = 100 +LOGGING = { + "dynaconf_merge": True, + "loggers": { + '': { + 'handlers': ['console'], + 'level': 'INFO', + }, + 'pulpcore.deprecation': { + 'handlers': ['console'], + 'level': 'ERROR', + 'propagate': False, + }, + 'django_guid': { + 'handlers': ['console'], + 'level': 'WARNING', + 'propagate': False, + }, + }, +}
Puppet / Puppet 8 - AlmaLinux 8 - Pulp nightly
Process completed with exit code 1.
Puppet / Puppet 7 - AlmaLinux 8 - Pulp nightly: spec/acceptance/settings_spec.rb#L102
AUTHENTICATION_BACKENDS setting default AUTHENTICATION_BACKENDS File "/etc/pulp/settings.py" content is expected to match /^AUTHENTICATION_BACKENDS = \['pulpcore.app.authentication.PulpNoCreateRemoteUserBackend'\]$/ Failure/Error: its(:content) { is_expected.to match(/^AUTHENTICATION_BACKENDS = \['pulpcore.app.authentication.PulpNoCreateRemoteUserBackend'\]$/) } expected "################################################################################\n# File managed by ...nsole'],\n 'level': 'WARNING',\n 'propagate': False,\n },\n },\n}\n" to match /^AUTHENTICATION_BACKENDS = \['pulpcore.app.authentication.PulpNoCreateRemoteUserBackend'\]$/ Diff: @@ -1,75 +1,149 @@ -/^AUTHENTICATION_BACKENDS = \['pulpcore.app.authentication.PulpNoCreateRemoteUserBackend'\]$/ +################################################################################ +# File managed by Puppet module: pulpcore +################################################################################ +# Not only will edits be overwritten later, there is also a strong +# possibility of breaking the system if changes are made here without making +# required corresponding changes elsewhere. Refer to the documentation used to +# install Pulpcore to determine the safe and persistent way to modify the +# configuration. +################################################################################ + +# Send anonymous usage data to https://analytics.pulpproject.org/ unless this is +# explicitly defined with value False. This data is used by the Pulp project +# to make informed, data-driven decisions about future feature development. +# ANALYTICS = False + +CONTENT_ORIGIN = "https://almalinux8-64-puppet7.example.com" +SECRET_KEY = "Zncz4HKSdquruuZtiP2uprBmQP72VFB2BGxWhLM2hqDSZpUcxh" +DATABASES = { + 'default': { + 'ENGINE': 'django.db.backends.postgresql', + 'NAME': 'pulpcore', + 'USER': 'pulp', + 'PASSWORD': '8Kp4K7WGxmS6RcD8qQWw6ei75nncEvmM', + 'HOST': 'localhost', + 'PORT': '5432', + }, +} +REDIS_URL = "redis://localhost:6379/8" + + +MEDIA_ROOT = "/var/lib/pulp/media" +STATIC_ROOT = "/var/lib/pulp/assets" +STATIC_URL = "/assets/" +FILE_UPLOAD_TEMP_DIR = "/var/lib/pulp/tmp" +WORKING_DIRECTORY = "/var/lib/pulp/tmp" + +REMOTE_USER_ENVIRON_NAME = 'HTTP_REMOTE_USER' +AUTHENTICATION_BACKENDS = ["pulpcore.app.authentication.PulpNoCreateRemoteUserBackend"] + +REST_FRAMEWORK__DEFAULT_AUTHENTICATION_CLASSES = ( + 'rest_framework.authentication.SessionAuthentication', + 'pulpcore.app.authentication.PulpRemoteUserAuthentication', +) + +ALLOWED_IMPORT_PATHS = ["/var/lib/pulp/sync_imports"] +ALLOWED_EXPORT_PATHS = [] +ALLOWED_CONTENT_CHECKSUMS = ["sha224", "sha256", "sha384", "sha512"] + +# Derive HTTP/HTTPS via the X-Forwarded-Proto header set by Apache +SECURE_PROXY_SSL_HEADER = ('HTTP_X_FORWARDED_PROTO', 'https') + +CACHE_ENABLED = False + +# HIDE_GUARDED_DISTRIBUTIONS = False + +# IMPORT_WORKERS_PERCENT = 100 +LOGGING = { + "dynaconf_merge": True, + "loggers": { + '': { + 'handlers': ['console'], + 'level': 'INFO', + }, + 'pulpcore.deprecation': { + 'handlers': ['console'], + 'level': 'ERROR', + 'propagate': False, + }, + 'django_guid': { + 'handlers': ['console'], + 'level': 'WARNING', + 'propagate': False, + }, + }, +}
Puppet / Puppet 7 - AlmaLinux 8 - Pulp nightly
Process completed with exit code 1.
Puppet / Puppet 8 - CentOS 9 - Pulp nightly: spec/acceptance/settings_spec.rb#L102
AUTHENTICATION_BACKENDS setting default AUTHENTICATION_BACKENDS File "/etc/pulp/settings.py" content is expected to match /^AUTHENTICATION_BACKENDS = \['pulpcore.app.authentication.PulpNoCreateRemoteUserBackend'\]$/ Failure/Error: its(:content) { is_expected.to match(/^AUTHENTICATION_BACKENDS = \['pulpcore.app.authentication.PulpNoCreateRemoteUserBackend'\]$/) } expected "################################################################################\n# File managed by ...nsole'],\n 'level': 'WARNING',\n 'propagate': False,\n },\n },\n}\n" to match /^AUTHENTICATION_BACKENDS = \['pulpcore.app.authentication.PulpNoCreateRemoteUserBackend'\]$/ Diff: @@ -1,75 +1,149 @@ -/^AUTHENTICATION_BACKENDS = \['pulpcore.app.authentication.PulpNoCreateRemoteUserBackend'\]$/ +################################################################################ +# File managed by Puppet module: pulpcore +################################################################################ +# Not only will edits be overwritten later, there is also a strong +# possibility of breaking the system if changes are made here without making +# required corresponding changes elsewhere. Refer to the documentation used to +# install Pulpcore to determine the safe and persistent way to modify the +# configuration. +################################################################################ + +# Send anonymous usage data to https://analytics.pulpproject.org/ unless this is +# explicitly defined with value False. This data is used by the Pulp project +# to make informed, data-driven decisions about future feature development. +# ANALYTICS = False + +CONTENT_ORIGIN = "https://centos9-64-puppet8.example.com" +SECRET_KEY = "gW37BasMf7np84scUSRpVpJJMtbXJ5LiyeMgRpp82grcdGSScj" +DATABASES = { + 'default': { + 'ENGINE': 'django.db.backends.postgresql', + 'NAME': 'pulpcore', + 'USER': 'pulp', + 'PASSWORD': 'KVWuhb9C39cAjgxW4YsMhT76oqCDmhNp', + 'HOST': 'localhost', + 'PORT': '5432', + }, +} +REDIS_URL = "redis://localhost:6379/8" + + +MEDIA_ROOT = "/var/lib/pulp/media" +STATIC_ROOT = "/var/lib/pulp/assets" +STATIC_URL = "/assets/" +FILE_UPLOAD_TEMP_DIR = "/var/lib/pulp/tmp" +WORKING_DIRECTORY = "/var/lib/pulp/tmp" + +REMOTE_USER_ENVIRON_NAME = 'HTTP_REMOTE_USER' +AUTHENTICATION_BACKENDS = ["pulpcore.app.authentication.PulpNoCreateRemoteUserBackend"] + +REST_FRAMEWORK__DEFAULT_AUTHENTICATION_CLASSES = ( + 'rest_framework.authentication.SessionAuthentication', + 'pulpcore.app.authentication.PulpRemoteUserAuthentication', +) + +ALLOWED_IMPORT_PATHS = ["/var/lib/pulp/sync_imports"] +ALLOWED_EXPORT_PATHS = [] +ALLOWED_CONTENT_CHECKSUMS = ["sha224", "sha256", "sha384", "sha512"] + +# Derive HTTP/HTTPS via the X-Forwarded-Proto header set by Apache +SECURE_PROXY_SSL_HEADER = ('HTTP_X_FORWARDED_PROTO', 'https') + +CACHE_ENABLED = False + +# HIDE_GUARDED_DISTRIBUTIONS = False + +# IMPORT_WORKERS_PERCENT = 100 +LOGGING = { + "dynaconf_merge": True, + "loggers": { + '': { + 'handlers': ['console'], + 'level': 'INFO', + }, + 'pulpcore.deprecation': { + 'handlers': ['console'], + 'level': 'ERROR', + 'propagate': False, + }, + 'django_guid': { + 'handlers': ['console'], + 'level': 'WARNING', + 'propagate': False, + }, + }, +}
Puppet / Puppet 8 - CentOS 9 - Pulp nightly
Process completed with exit code 1.
Puppet / Puppet 8 - AlmaLinux 9 - Pulp nightly: spec/acceptance/settings_spec.rb#L102
AUTHENTICATION_BACKENDS setting default AUTHENTICATION_BACKENDS File "/etc/pulp/settings.py" content is expected to match /^AUTHENTICATION_BACKENDS = \['pulpcore.app.authentication.PulpNoCreateRemoteUserBackend'\]$/ Failure/Error: its(:content) { is_expected.to match(/^AUTHENTICATION_BACKENDS = \['pulpcore.app.authentication.PulpNoCreateRemoteUserBackend'\]$/) } expected "################################################################################\n# File managed by ...nsole'],\n 'level': 'WARNING',\n 'propagate': False,\n },\n },\n}\n" to match /^AUTHENTICATION_BACKENDS = \['pulpcore.app.authentication.PulpNoCreateRemoteUserBackend'\]$/ Diff: @@ -1,75 +1,149 @@ -/^AUTHENTICATION_BACKENDS = \['pulpcore.app.authentication.PulpNoCreateRemoteUserBackend'\]$/ +################################################################################ +# File managed by Puppet module: pulpcore +################################################################################ +# Not only will edits be overwritten later, there is also a strong +# possibility of breaking the system if changes are made here without making +# required corresponding changes elsewhere. Refer to the documentation used to +# install Pulpcore to determine the safe and persistent way to modify the +# configuration. +################################################################################ + +# Send anonymous usage data to https://analytics.pulpproject.org/ unless this is +# explicitly defined with value False. This data is used by the Pulp project +# to make informed, data-driven decisions about future feature development. +# ANALYTICS = False + +CONTENT_ORIGIN = "https://almalinux9-64-puppet8.example.com" +SECRET_KEY = "MoXeg7RZPT8sCdvedg5ASnLSuX4kjTAztvVoLFBEerVNvwedBM" +DATABASES = { + 'default': { + 'ENGINE': 'django.db.backends.postgresql', + 'NAME': 'pulpcore', + 'USER': 'pulp', + 'PASSWORD': '5DQZBCp7gw9PZCZubyBicgpMLCf6Wohz', + 'HOST': 'localhost', + 'PORT': '5432', + }, +} +REDIS_URL = "redis://localhost:6379/8" + + +MEDIA_ROOT = "/var/lib/pulp/media" +STATIC_ROOT = "/var/lib/pulp/assets" +STATIC_URL = "/assets/" +FILE_UPLOAD_TEMP_DIR = "/var/lib/pulp/tmp" +WORKING_DIRECTORY = "/var/lib/pulp/tmp" + +REMOTE_USER_ENVIRON_NAME = 'HTTP_REMOTE_USER' +AUTHENTICATION_BACKENDS = ["pulpcore.app.authentication.PulpNoCreateRemoteUserBackend"] + +REST_FRAMEWORK__DEFAULT_AUTHENTICATION_CLASSES = ( + 'rest_framework.authentication.SessionAuthentication', + 'pulpcore.app.authentication.PulpRemoteUserAuthentication', +) + +ALLOWED_IMPORT_PATHS = ["/var/lib/pulp/sync_imports"] +ALLOWED_EXPORT_PATHS = [] +ALLOWED_CONTENT_CHECKSUMS = ["sha224", "sha256", "sha384", "sha512"] + +# Derive HTTP/HTTPS via the X-Forwarded-Proto header set by Apache +SECURE_PROXY_SSL_HEADER = ('HTTP_X_FORWARDED_PROTO', 'https') + +CACHE_ENABLED = False + +# HIDE_GUARDED_DISTRIBUTIONS = False + +# IMPORT_WORKERS_PERCENT = 100 +LOGGING = { + "dynaconf_merge": True, + "loggers": { + '': { + 'handlers': ['console'], + 'level': 'INFO', + }, + 'pulpcore.deprecation': { + 'handlers': ['console'], + 'level': 'ERROR', + 'propagate': False, + }, + 'django_guid': { + 'handlers': ['console'], + 'level': 'WARNING', + 'propagate': False, + }, + }, +}
Puppet / Puppet 8 - AlmaLinux 9 - Pulp nightly
Process completed with exit code 1.